throbber
US009270790B2
`
`(12) United States Patent
`Balassanian
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,270,790 B2
`Feb. 23, 2016
`
`(54) METHOD AND SYSTEM FOR DATA
`DEMULTIPLEXING
`
`(71) Applicant: IMPLICIT, LLC, Seattle, WA (US)
`(72) Inventor: Edward Balassanian, Seattle, WA (US)
`(73) Assignee: Implicit, LLC, Seattle, WA (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 49 days.
`(21) Appl. No.: 14/230,952
`(22) Filed:
`Mar. 31, 2014
`(65)
`Prior Publication Data
`US 2015/OOO9997 A1
`Jan. 8, 2015
`
`O
`O
`Related U.S. Application Data
`(63) Continuation of application No. 13/911.324, filed on
`Jun. 6, 2013, now Pat. No. 8,694,683, which is a
`continuation of application No. 13/236,090, filed on
`Sep. 19, 201 1, now abandoned, which is a continuation
`of application No. 10/636,314, filed on Aug. 6, 2003,
`now Pat. No. 8,055,786, which is a continuation of
`application No. 09/474,664, filed on Dec. 29, 1999,
`now Pat. No. 6,629,163.
`51) Int. C
`(51) Int. Cl.
`H04L 29/06
`H04L 2/70
`H04L 29/08
`(52) U.S. Cl.
`CPC ................ H04L 69/08 (2013.01); H04L 29/06
`(2013.01); H04L 45/00 (2013.01); H04L 69/22
`(2013.01); H04L 69/32 (2013.01)
`(58) Field of Classification Search
`None
`See application file for complete search history.
`
`(2006.01)
`(2013.01)
`(2006.01)
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`3, 1994 Yun
`5,298,674. A
`3: Ery s al
`5:33 A
`6/1998 HaSebe
`5,761,651 A
`5,826,027 A 10/1998 Pedersen et al.
`5,835,726 A 11, 1998 Shwed et al.
`5,848,233 A 12/1998 Radia et al.
`3. A 39. Sin etal
`5,898,830 A
`4/1999 Wesinger, Jr. et al.
`(Continued)
`FOREIGN PATENT DOCUMENTS
`E. ''.
`OTHER PUBLICATIONS
`
`E.
`
`Alexander, D. et al., “The SwitchWare Active Network Architec
`ture'. Jun. 6, 1998. IEEE.
`
`(Continued)
`
`Primary Examiner — Duc Duong
`(74) Attorney, Agent, or Firm — Meyertons, Hood, Kivlin,
`Kowert & Goetzel, P.C.
`
`ABSTRACT
`(57)
`A method and system for demultiplexing packets of a mes
`sage is provided. The demultiplexing system receives packets
`of a message, identifies a sequence of message handlers for
`processing the message, identifies state information associ
`ated with the message for each message handler, and invokes
`the message handlers passing the message and the associated
`state information. The system identifies the message handlers
`based on the initial data type of the message and a target data
`type. The identified message handlers effect the conversion of
`the data to the target data type through various intermediate
`data types.
`
`20 Claims, 16 Drawing Sheets
`
`-
`
`CP
`
`f:
`53
`
`40
`
`TCP
`
`t
`
`452
`
`PATH (StockList)
`^42
`
`SESSIN
`
`TCR
`
`,
`42
`
`it
`
`42
`
`423:225
`
`j
`
`4i. N ETHERE!
`T.
`
`422
`
`4:2
`
`423
`
`42
`
`QUEE
`
`QUEE
`
`QUEE
`
`A
`Phi
`(REFERENCE)
`
`Juniper Ex. 1005-p. 1
`Juniper v Implicit
`
`

`

`US 9,270,790 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`7/2000 Cheriton et al.
`6,091,725 A
`8, 2000 Alam et al.
`6,104,500 A
`9/2000 Engel et al.
`6,115,393 A
`9/2000 Shipley
`6,119,236 A
`6,141,749 A 10, 2000 COSS et al.
`6,151,390 A 11/2000 WolftSun et al.
`6,226,267 B1
`5/2001 Spinney et al.
`6,243,667 B1
`6, 2001 Kerr et al.
`6,259,781 B1
`7/2001 Crouch et al.
`6,356,529 B1
`3, 2002 Zarom
`6,401,132 B1
`6, 2002 Bellwood et al.
`6.426,943 B1
`7/2002 Spinney et al.
`6,519,636 B2
`2/2003 Engel et al.
`6,598,034 B1
`7, 2003 Kloth
`6,629,163 B1* 9/2003 Balassanian ............ HO4L 29/06
`370/401
`
`1 1/2003 Dietz et al.
`6,651,099 B1
`1/2004 Eerola
`6,678,518 B2
`1/2004 Jorgensen
`6,680,922 B1
`3/2004 Deng et al.
`6,701432 B1
`3, 2004 Amir et al.
`6,711,166 B1
`8/2004 Taylor
`6,785,730 B1
`3/2005 Kist et al.
`6,871,179 B1
`5, 2005 Kerr et al.
`6,889, 181 B2
`7,233,569 B1* 6/2007 Swallow ............. HO4L 12,4633
`370,225
`7,281,036 B1 * 10/2007 Lu ..................... HO4L 29, 12028
`TO9.220
`
`8,694,683 B2
`
`6, 2008 Saito et al.
`7,383,341 B1
`8,055,786 B2 * 1 1/2011 Balassanian ............ HO4L 29/06
`370,351
`4/2014 Balassanian ............ HO4L 29/06
`370/466
`2008/0250045 A1 * 10, 2008 Balassanian ...... GO6F 17,30569
`2009,0265695 A1 * 10, 2009 Karino ................ G06F 11.3612
`717 131
`
`OTHER PUBLICATIONS
`
`Antoniazzi. S. et al., “An Open Software Architecture for Multimedia
`Consumer Terminals'. Central Research Labs, Italy; Alcatel SEL
`Research Centre, Germany, ECMAST 1997.
`Arbanowski, Stefan, “Generic Description of Telecommunication
`Services and Dynamic Resource Selection in Intelligent Communi
`cation Environments'. Thesis, Technische Universitat Berlin, Oct. 9,
`1996. (3 documents).
`Arbanowski, S., et al., Service Personalization for Unified Messaging
`Systems, Jul. 6-8, 1999. The Fourth IEEE Symposium on Computers
`and Communications, ISCC 99, Red Sea, Egypt.
`Atkinson, R. “Security Architecture for the Internet Protocol', Aug.
`1995, Naval Research Laboratory.
`Atkinson, R., “IP Authentication Header'. Aug. 1995, Naval
`Research Laboratory.
`Atkinson, R., “IP Encapsulating Security Payload (ESP). Aug.
`1995, Naval Research Laboratory.
`Back, G., et al., Java Operating Systems: Design and Implementa
`tion, Aug. 1998, Technical Report UUCS-98-015, University of
`Utah.
`Baker, Dr. Sean, "CORBA Implementation Issues', 1994, IONA
`Technologies, O'Reilly Institute Dublin, Ireland.
`Barrett, R., et al., “Intermediaries: New Places for Producing and
`Manipulating Web Content”, 1998, IBM Almaden Research Center,
`Elsevier Science.
`Bellare, M., et al., “A Concrete Security Treatment of Symmetric
`Encryption: Analysis of the DES Modes of Operation'. Aug. 15.
`1997. Dept. of Computer Science and Engineering, University of
`California, San Diego.
`Bellare, M., et al., “A Concrete Security Treatment of Symmetric
`Encryption: Analysis of the DES Modes of Operation'. Aug. 15.
`1997, IEEE.
`Bellare, M., et al., “XORMACs: New Methods for Message Authen
`tication Using Finite Pseudorandom Functions”, 1995, CRYPTO
`'95, LNCS 963, pp. 15-28, Springer-Verlag Berlin Heidelberg.
`
`Bellissard, L., et al., “Dynamic Reconfiguration of Agent-Based
`Applications'. Third European Research Seminar on Advances in
`Distributed Systems, (ERSADS 99) Madeira Island.
`Bolding, Darren, “Network Security, Filters and Firewalls”, 1995,
`www.acm.org/crossroads/Xrds2-1/security.html.
`Booch, G., et al., “Software Engineering with ADA’. 1994. Third
`Edition, The Benjamin/Cummings Publishing Company, Inc. (2
`documents).
`Breugst, et al., “Mobile Agents—Enabling Technology for Active
`Intelligent Network Implementation'. May/Jun. 1998, IEEE Net
`work.
`“C Library Functions”, AUTH(3) Sep. 17, 1993, Solbourne Com
`puter, Inc.
`Chapman, D., et al., “Building Internet Firewalls'. Sep. 1995,
`O'Reilly & Associates, Inc.
`CheckPoint FireWall-1 Technical White Paper, Jul 18, 1994,
`CheckPoint Software Technologies, Ltd.
`CheckPoint FireWall-1 White Paper, Sep. 1995, Version 2.0,
`CheckPoint Software Technologies, Ltd.
`Command Line Interface Guide PN 093-001 1-000 Rev C Version
`2.5, 2000-2001, NetScreen Technologies, Inc.
`Coulson, G. et al., “A CORBA Compliant Real-Time Multimedia
`Platform for Broadband Networks”. LectureNotes in Computer Sci
`ence, 1996, Trends in Distributed Systems CORBA and Beyond.
`Cox, Brad, "SuperDistribution, Objects. As Property on the Elec
`tronic Frontier', 1996, Addison-Wesley Publishing Company.
`Cranes, et al., “A Configurable Protocol Architecture for CORBA
`Environments'. Autonomous Decentralized Systems 1997 Proceed
`ings ISADS. Third International Symposium Apr. 9-11, 1997.
`Curran, K., et al., "CORBA Lacks Venom'. University of Ulster,
`Northern Ireland, UK 2000.
`Dannert, Andreas, “Call Logic Service for a Personal Communica
`tion Supporting System'. Thesis, Jan. 20, 1998, Technische
`Universitat Berlin.
`DARPA Internet Program Protocol Specification, “Transmission
`Control Protocol'. Sep. 1981, Information Sciences Institute, Cali
`fornia.
`DARPA Internet Program Protocol Specification, “Internet Proto
`col'. Sep. 1981, Information Sciences Institute, California.
`Decasper, D., et al., “Crossbow: A Toolkit for Integrated Services
`over Cell Switched IPv6', 1997, Computer Engineering and Net
`works Laboratory, ETH Zurich, Switzerland.
`Decasper, D., et al., “Router Plugins A Software Architecture for
`Next Generation Routers”, 1998, Proceedings of ACM SIGCONM
`98.
`Deering, S., et al., Internet Protocol, Version 6 (IPv6) Specification,
`Dec. 1998, Nokia, The Internet Society.
`Deering, S., et al., Internet Protocol, Version 6 (IPv6) Specification,
`Dec. 1995, Network Working Group, RFC 1883.
`Dutton, et al., “Asynchronous Transfer Mode Technical Overview
`(ATM), Second Edition; IBM, Oct. 1995, 2" Edition, Prentice Hall
`PTR, USA.
`Eckardt, T., et al., “Application of X.500 and X.700 Standards for
`Supporting Personal Communications in Distributed Computing
`Environments', 1995, IEEE.
`Eckardt, T., et al., “Personal Communications Support based on
`TMN and TINA Concepts”, 1996, IEEE Intelligent Network Work
`shop (IN '96), Apr. 21-24, Melbourne, Australia.
`Eckardt, T., et al., “Beyond In and UPT A Personal Communica
`tions Support System Based on TMN Concepts”. Sep. 1997, IEEE
`Journal on Selected Areas in Communications, vol. 15, No. 7.
`Egevang, K., et al., “The IP Network Address Translator (NAT)'.
`May 1994, Network Working Group, RFC 1631.
`Estrin, D., et al., “Visa Protocols for Controlling Inter-Organizational
`Datagram Flow”. Dec. 1998, Computer Science Department, Uni
`versity of Southern California and Digital Equipment Corporation.
`Faupel, M., “Java Distribution and Deployment”, Oct. 9, 1997, APM
`Ltd., United Kingdom.
`Felber, P. “The CORBA Object Group Service: A Service Approach
`to Object Groups in CORBA'. Thesis, 1998, Ecole Polytechnique
`Federale de Lausanne, Switzerland.
`
`Juniper Ex. 1005-p. 2
`Juniper v Implicit
`
`

`

`US 9,270,790 B2
`Page 3
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Fish, R., et al., “DRoPS. Kernel Support for Runtime Adaptable
`Protocols”, Aug. 25-27, 1998, IEEE 24' Euromicro Conference,
`Sweden.
`Fiuczynski, M., et al., “An Extensible Protocol Architecture for
`Application-Specific Networking”. 1996, Department of Computer
`Science and Engineering, University of Washington.
`Franz, Stefan, “Job and Stream Control in Heterogeneous Hardware
`and Software Architectures”, Apr. 1998, Technische Universitat, Ber
`lin (2 documents).
`Fraser, T., “DTE Firewalls: Phase Two Measurement and Evaluation
`Report”. Jul. 22, 1997, Trusted Information Systems, USA.
`Gazis, V., et al., “A Survey of Dynamically Adaptable Protocol
`Stacks', first Quarter 2010, IEEE Communications Surveys & Tuto
`rials, vol. 12, No. 1, 1 Quarter.
`Gokhale, A., et al., “Evaluating the Performance of Demultiplexing
`Strategies for Real-Time CORBA”, Nov. 1997, GLOBECOM.
`Gokhale, A., et al., “Measuring and Optimizing CORBA Latency and
`Scalability Over High-Speed Networks”, Apr. 1998, IEEE Transac
`tion on Computers, vol. 47, No. 4; Proceedings of the International
`Conference on Distributed Computing Systems (ICDCS 97) May
`27-30, 1997.
`Gokhale, A., et al., “Operating System Support for High-Perfor
`mance, Real-Time CORBA’, 1996.
`Gokhale, A., et al., “Principles for Optimizing CORBA Internet
`Inter-ORB Protocol Performance'. Jan. 9, 1998, Proceedings of the
`HICSS Conference, Hawaii.
`Gong, Li, “Java Security: Present and Near Future', May/Jun. 1997.
`IEEE Micro.
`Gong, Li, "New Security Architectural Directions for Java (Extended
`Abstract), Dec. 19, 1996, IEEE.
`Gong, Li, "Secure Java Class Loading”, Nov./Dec. 1998, IEEE
`Internet.
`Goos, G., et al., “LectureNotes in Computer Science: Mobile Agents
`and Security”, 1998, Springer-Verlag Berlin Heidelberg.
`Goralski, W., “Introduction to ATM Networking”. 1995, McGraw
`Hill Series on Computer Communications, USA.
`Hamzeh, K., et al., Layer Two Tunneling Protocol"L2TP, Jan. 1998,
`PPP Working Group, Internet Draft.
`Harrison, T., et al., “The Design and Performance of a Real-Time
`CORBA Event Service”, Aug. 8, 1997.Proceedings of the OOPSLA
`97 Conference, Atlanta, Georgia in Oct. 1997.
`Huitema, Christian, “IPv6 The New Internet Protocol, 1997
`Prentice Hall, Second Edition.
`Hutchins, J., et al., “Enhanced Internet Firewall Design Using State
`ful Filters Final Report', Aug. 1997, Sandia Report; Sandia National
`Laboratories.
`IBM, Local Area Network Concepts and Products: Routers and Gate
`ways, May 1996.
`Juniper Networks Press Release, Juniper Networks Announces
`Junos, First Routing Operating System for High-Growth Internet
`Backbone Networks, Jul. 1, 1998, Juniper Networks.
`Juniper Networks Press Release, Juniper Networks Ships the Indus
`try's First Internet Backbone Router Delivering Unrivaled Scal
`ability, Control and Performance, Sep. 16, 1998, Juniper Networks.
`Karn, P. et al., “The ESP DES-CBC Transform”, Aug. 1995, Net
`work Working Group, RFC 1829.
`Kelsey, J. et al., “Authenticating Outputs of Computer Software
`Using a Cryptographic Coprocessor'. Sep. 1996, CARDIS.
`Krieger, D., et al., “The Emergence of Distributed Component Plat
`forms', Mar. 1998, IEEE.
`Krupczak, B., et al., “Implementing Communication Protocols in
`Java”, Oct. 1998, IEEE Communications Magazine.
`Krupczak, B., et al., “Implementing Protocols in Java: The Price of
`Portability”, 1998, IEEE.
`Lawson, Stephen, “Cisco NetFlow Switching Speeds Traffic Rout
`ing”, Jul. 7, 1997, Infoworld.
`Li, S., et al., “Active Gateway: A Facility for Video Conferencing
`Traffic Control”, Feb. 1, 1997, Purdue University; Purdue e-Pubs;
`Computer Science Technical Reports.
`
`Magedanz, T., et al., “Intelligent Agents: An Emerging Technology
`for Next Generation Telecommunications?', 1996, IEEE.
`Mills, H., et al., “Principles of Information Systems Analysis and
`Design”, 1986, Academic Press, Inc. (2 documents).
`Mosberger, David, "Scout. A Path-Based Operating System'. Doc
`toral Dissertation Submitted to the University of Arizona, 1997 (3
`documents).
`Muhugusa, M., et al., “ComScript: An Environment for the Imple
`mentation of Protocol Stacks and their Dynamic Reconfiguration'.
`Dec. 1994.
`Nelson, M., et al., The Data Compression Book, 2" Edition, 1996,
`M&T Books. A division of MIS Press, Inc.
`NetRanger User's Guide, 1996, WheelGroup Corporation.
`NetScreen Command Line Reference Guide, 2000, PN 093-0000
`001 Rev A. NetScreen Technologies, Inc., USA.
`NetScreen Command Line Reference Guide, 2000, PN 093-0000
`001 NetScreen Technologies, Inc., USA.
`NetScreen Concepts and Examples ScreenOS Reference Guide,
`1998-2001, Version 2.5 P/N 093-0039-000 Rev. A., NetScreen Tech
`nologies, Inc.
`NetScreen Products Webpage, wysiwyg://body bottom.3/http://
`www.een.com/products/products.html 1998-1999, NetScreen
`Technologies, Inc.
`NetScreen WebOI, Reference Guide, Version 2.5.0 P/N 093-0040
`000 Rev. A. 2000-2001, NetScreen Technologies, Inc.
`NetStalker Installation and User's Guide, 1996, Version 1.0.2, Hay
`Stack Labs, Inc.
`Niculescu, Dragos, "Survey of Active Network Research', Jul. 14.
`1999, Rutgers University.
`Nortel Northern Telecom, “ISDN Primary Rate User-Network Inter
`face Specification'. Aug. 1998.
`Nygren, Erik, “The Design and Implementation of a High-Perfor
`mance Active Network Node'. Thesis, Feb. 1998, MIT.
`Osbourne, E., “Morningstar Technologies Secure0onnect Dynamic
`Firewall Filter User's Guide”, Jun. 14, 1995, V. 1.4, Morning Star
`Technologies, Inc.
`Padovano, Michael, “Networking Applications on UNIX System V
`Release 4” 1993 Prentice Hall, USA (2 documents).
`Pfeifer, T., "Automatic Conversion of Communication Media', 2000,
`GMD Research Series, Germany.
`Pfeifer, T., "Automatic Conversion of Communication Media'. The
`sis, 1999, Technischen Universitat Berlin, Berlin.
`Pfeifer, T., et al., “Applying Quality-of-Service Parametrization for
`Medium-to-Medium Conversion”, Aug. 25-28, 1996, 8' IEEE Work
`shop on Local and Metropolitan Area Networks, Potsdam, Germany.
`Pfeifer, T., “Micronet Machines—New Architectural Approaches for
`Multimedia End-Systems', 1993 Technical University of Berlin.
`Pfeifer, T. “On the Convergence of Distributed Computing and Tele
`communications in the Field of Personal Communications', 1995,
`KiVS, Berlin.
`Pfeifer, T., "Speech Synthesis in the Intelligent Personal Communi
`cation Support System (IPCSS)”, Nov. 2-3, 1995, 2"Speak! Work
`shop on Speech Generation in Multimodal Information Systems and
`Practical Applications.
`Pfeifer, T., et al., “Generic Conversion of Communication Media for
`Supporting Personal Mobility”, Nov. 25-27, 1996, Proc. of the Third
`COST 237 Workshop: Multimedia Telecommunications and Appli
`cations.
`Pfeifer, T., et al., “Intelligent Handling of Communication Media'.
`Oct. 29-31, 1997, 6' IEEE Workshop on Future Trends of Distributed
`Computing Systems (FTDCS) Tunis.
`Pfeifer, T., et al., “Resource Selection in Heterogeneous Communi
`cation Environments using the Teleservice Descriptor'. Dec. 15.-19.
`1997, Proceedings from the 4 COST 237 Workshop: From Multi
`media Services to Network Services, Lisboa.
`Pfeifer, T., et al., Mobile Guide—Location-Aware Applications from
`the Lab to the Market, 1998, IDMS '98, LNCS 1483, pp. 15-28.
`Pfeifer, T., et al., “The Active Store providing Quality Enhanced
`Unified Messaging”, Oct. 20-22, 1998, 5' Conference on computer
`Communications, AFRICOM-CCDC 98, Tunis.
`Pfeifer, T., et al., “A Modular Location-Aware Service and Applica
`tion Platform”, 1999, Technical University of Berlin.
`
`Juniper Ex. 1005-p. 3
`Juniper v Implicit
`
`

`

`US 9,270,790 B2
`Page 4
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Plagemann, T., et al., “Evaluating Crucial Performance Issues of
`Protocol Configuration in DaCapo”, 1994, University of Oslo.
`Psounis, Konstantinos, "Active Networks. Applications, Security,
`Safety, and Architectures”. First Quarter 1999, IEEE Communica
`tions Surveys.
`Rabiner, Lawrence, "Applications of Speech Recognition in the Area
`of Telecommunications”, 1997, IEEE.
`Raman. Suchitra, etal, "A Model, Analysis, and Protocol Framework
`for Sofi State-based Communications'. Department of EECS, Uni
`versity of California, Berkeley.
`Rogaway, Phillip. “Bucket Hashing and its Application to Fast Mes
`sage Authentication', Oct. 13, 1997. Department of Computer Sci
`ence, University of California.
`Schneier, B., et al., “Remote Auditing of Software Outputs. Using a
`Trusted CoProcessor”, 1997, Elsevier Paper Reprint 1999.
`Tennenhouse, D., et al., “From Internet to ActiveNet, Laboratory of
`Computer Science, MIT, 1996.
`Tudor, P., “Tutorial MPEG-2 Video Compression”. Dec. 1995, Elec
`tronics & Communication Engineering Journal.
`US Copyright Webpage of Copyright Title, “IPv6. the New Internet
`Protocol, by Christian Huitema, 1998 Prentice Hall.
`Van der Meer, et al., “An Approach for a 4' Generation Messaging
`System'. Mar. 21-23, 1999. The Fourth International Symposium on
`Autonomous Decentralized Systems ISADS '99, Tokyo.
`Van der Meer, Sven, "Dynamic Configuration Management of the
`Equipment in Distributed Communication Environments'. Thesis,
`Oct. 6, 1996, Berlin (3 documents).
`Van Renesse, R. et al., “Building Adaptive Systems. Using Ensemble'.
`Cornell University Jul. 1997.
`Venkatesan, R., et al., “Threat-Adaptive Security Policy”, 1997,
`IEEE
`Wetherall, D., et al., “The Active IP Option”, Sep.1996, Proceedings
`of the 7" ACM SIGOPS European Workshop, Connemara, Ireland.
`Welch, Terry, "A Technique for High-Performance Data Compres
`sion', 1984. Sperry Research Center, IEEE.
`Zeletin, R. et al., “Applying Location-Aware Computing for Elec
`tronic Commerce. Mobile Guide”, Oct. 20-22, 1998, 5' Conference
`on Computer Communications, AFRICOM-CCDC 98, Tunis.
`Zell, Markus, "Selection of Converter Chains by Means of Quality of
`Service Analysis'. Thesis, Feb. 12, 1998, Technische Universitat
`Berlin.
`Implicit Networks, Inc. v. Advanced Micro Devices, Inc. et al.; C08
`0.184 JLR; USDC for the Western District of Washington, Seattle
`Division.
`Feb. 4, 2008 Plaintiff's Original Complaint.
`Aug. 26, 2008 Defendant NVIDIA Corporation's Answer to Com
`plaint.
`Aug. 26, 2008 Defendant Sun Microsystems, Inc.'s Answer to Com
`plaint.
`Aug. 27, 2008 Defendant Advanced Micro Devices, Inc.'s Answer to
`Complaint for Patent Infringement.
`Aug. 27, 2008 RealNetworks, Inc.'s Answer to Implicit Networks,
`Inc.'s Original Complaint for Patent Infringement, Affirmative
`Defenses, and Counterclaims.
`Aug. 27, 2008 Intel Corp.'s Answer, Defenses and Counterclaims.
`Aug. 27, 2008 Defendant RMI Corporation's Answer to Plaintiffs
`Original Complaint.
`Sep. 15, 2008 Plaintiffs Reply to NVIDIA Corporation's Counter
`claims.
`Sep. 15, 2008 Plaintiffs Reply to Sun Microsystems Inc.'s Counter
`claims.
`Sep. 16, 2008 Plaintiffs Reply to RealNetworks, Inc.'s Counter
`claims.
`Sep. 16, 2008 Plaintiffs Reply to Intel Corp.’s Counterclaims.
`Dec. 10, 2008 Order granting Stipulated Motion for Dismissal with
`Prejudice re. NVIDIA Corporation, Inc.
`Dec. 16, 2008 Defendants AMD, RealNetworks, RMI, and Sun's
`Motion to Stay Pending the Patent and Trademark Office's Reexami
`nation of the 163 Patent.
`
`Dec. 29, 2008 Order granting Stipulated Motion for Dismissal with
`out Prejudice of Claims re Sun Microsystems, Inc.
`Jan. 5, 2009 Plaintiff's Opposition to Defendants AMD,
`RealNetworks, RMI, and Sun's Motion to Stay Pending Reexamina
`tion and Exhibit A.
`Jan. 9, 2009 Reply of Defendants AMD, RealNetworks, RMI, and
`Sun's Motion to Stay Pending the Patent and Trademark Office's
`Reexamination of the 163 Patent.
`Feb. 9, 2009 Order Granting Stay Pending the United States Patent
`and Trademark Office's Reexamination of U.S. Pat. No. 6,629,163.
`Feb. 17, 2009 Order Granting Stipulated Motion for Dismissal of
`Advanced Micro Devices, Inc. with Prejudice.
`May 14, 2009 Order Granting Stipulated Motion for Dismissal of
`RMI Corporation with Prejudice.
`Oct. 13, 2009 Order Granting Stipulated Motion for Dismissal of
`Claims Against and Counterclaims by Intel Corporation.
`Oct. 30, 2009 Executed Order for Stipulated Motion for Dismissal of
`Claims Against and Counterclaims by RealNetworks, Inc.
`Implicit Networks, Inc. v. Microsofi Corp., C09-5628 HLR; USDC
`for the Northern District of California, San Francisco Division.
`Nov. 30, 2009 Plaintiffs. Original Complaint, Implicit v Microsofi,
`Case No. 09-5628.
`Jan. 22, 2010 Order Dismissing Case, Implicit v Microsofi, Case No.
`O9-5628.
`Implicit Networks, Inc. v. Cisco Systems, Inc., C10-3606 HRL:
`USDC for the Northern District of California, San Francisco Divi
`SO.
`Aug. 16, 2010 Plaintiffs. Original Complaint, Implicit v. Cisco, Case
`No. 10-3606.
`Nov. 22, 2010 Defendant Cisco Systems, Inc.'s Answer and Coun
`terclaims, Implicit v. Cisco, Case No. 10-3606.
`Dec. 13, 2010 Plaintiff, Implicit Networks, Inc.'s, Answer to Coun
`terclaims, Implicit v. Cisco, Case No. 10-3606.
`Oct. 4, 2011 Order of Dismissal with Prejudice, Implicit v. Cisco,
`Case No. 10-3606.
`Implicit Networks, Inc. v. Citrix Systems, Inc., C10-3766 JL: USDC
`for the Northern District of California, San Francisco Division.
`Aug. 24, 2010 Plaintiffs. Original Complaint, Implicit v Citrix, Case
`No. 10-3766.
`Dec. 1, 2010 Plaintiffs First Amended Complaint, Implicit v Citrix,
`Case No. 10-3766.
`Jan. 14, 2011 Defendant Citrix Systems, Inc.'s Answer, Defenses and
`Counter-complaint for Declaratory Judgment, Implicit v Citrix, Case
`No. 10-3766.
`Feb. 18, 2011 Plaintiff, Implicit Networks, Inc.'s, Answer to Defen
`dants Counterclaims, Implicit v Citrix, Case No. 10-3766.
`May 2, 2011 Order of Dismissal, Implicit v Citrix, Case No. 10-3766.
`Implicit Networks, Inc. v. F5 Networks, Inc., C10-3365 JCS; USDC
`for the Northern District of California, San Francisco Division.
`Jul. 30, 2010 Plaintiffs. Original Complaint, Implicit v F5, Case No.
`10-3365.
`Oct. 13, 2010 Defendants' Answer and Counter-Complaint, Implicit
`v F5, Case No. 10-3365.
`Nov. 3, 2010 Plaintiffs Answer to Counter-Complaint, Implicit v F5.
`Case No. 10-3365.
`Dec. 10, 2010 Plaintiffs First Amended Complaint, Implicit v F5.
`Case No. 10-3365.
`Jan. 14, 2011 Defendants' Answer to 1 Amended Complaint and
`Counterclaim, Implicit v F5, Case No. 10-3365.
`Feb. 18, 2011 Plaintiffs Answer to F5's Amended Counter-Com
`plaint, Implicit v F5, Case No. 10-3365.
`Apr. 18, 2011 Defendants' Amended Answer to 1 Amended Com
`plaint and Counter-Complaint, Implicit v F5, Case No. 10-3365.
`May 5, 2011 Plaintiffs Answer to F5's Amended Counter-Complaint,
`Implicit v F5, Case No. 10-3365.
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Implicit v
`F5, Case No. 10-3365.
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Exhibit A.
`Implicit v F5, Case No. 10-3365 (31 documents).
`Jul. 22, 2011 F5 Networks, Inc.'s Invalidity Contentions, Exhibit B,
`Implicit v F5, Case No. 10-3365.
`Oct. 18, 2011 Joint Claim Construction & Pre-Hearing Statement
`(PR4-3), Implicit v F5, Case No. 10-3365.
`
`Juniper Ex. 1005-p. 4
`Juniper v Implicit
`
`

`

`US 9,270,790 B2
`Page 5
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Oct. 18, 2011 Joint Claim Construction & Pre-Hearing Statement
`(PR4-3) Exhibit A, Implicit v F5, Case No. 10-3365 (2 documents).
`Nov. 28, 2011 Plaintiffs Opening Claim Construction Brief, Implicit
`v F5, Case No. 10-3365.
`Nov. 29, 2011 Amended Joint Claim Construction & Pre-Hearing
`Statement, Implicit v F5, Case No. 10-3365.
`Nov. 29, 2011 Amended Joint Claim Construction & Pre-Hearing
`Statement, Exhibit A. Implicit v F5, Case No. 10-3365.
`Dec. 12, 2011 Defendants' Claim Construction Brief, Implicit v F5.
`Case No. 10-3365.
`Dec. 19, 2011 Plaintiffs Reply to Defendants’ (F5, HP Juniper)
`Responsive Claim Construction Brief (4-5), Implicit v F5, Case No.
`10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 17, 2012;
`Implicit v F5, Case No. 10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 18, 2012;
`Implicit v F5, Case No. 10-3365.
`Jan. 27, 2012 Transcript of Proceeding Held on Jan. 19, 2012;
`Implicit v F5, Case No. 10-3365.
`Feb. 29, 2012 Claim Construction Order.
`Aug. 15, 2012 Storer Invalidity Report.
`Sep. 10, 2012 Implicit’s Expert Report of Scott M. Nettles.
`Mar. 13, 2013 Order Granting Defendants' Motion for Summary
`Judgment.
`Apr. 9, 2013 Notice of Appeal to the Federal Circuit.
`Implicit Networks, Inc. v. Hewlett-Packard Company, C10-3746
`JCS: USDC for the Northern District of California, San Francisco
`Division.
`Aug. 23, 2010 Plaintiffs Original Complaint, Implicit v HP, Case No.
`10-3746.
`Nov. 23, 2010 Plaintiffs First Amended Complaint, Implicit v HP,
`Case No. 10-3746.
`Jan. 14, 2011 Defendant HP's Answer and Counterclaims, Implicit v
`HP, Case No. 10-3746.
`Feb. 18, 2011 Implicit Networks, Inc.'s Answer to HP Counter
`claims, Implicit v HP, Case No. 10-3746.
`May 10, 2011 Plaintiffs Amended Disclosure of Asserted Claims
`and Infringement Contentions, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`Implicit v HP, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`A1-14, Implicit v HP, Case No. 10-3746.
`Jun. 30, 2011 Defendant HP Company's Invalidity Contentions,
`B1-21, Implicit v HP, Case No. 10-3746.
`Implicit Networks, Inc. v. Juniper Networks, C10-4234 EDL: USDC
`for the Northern District of California, San Francisco Division.
`Sep. 20, 2010 Plaintiff's Original Complaint, Implicit v Juniper, Case
`No. 10-4234.
`Nov. 12, 2010 Juniper Network's Motion to Dismiss For Failure to
`State a Claim Under Rule 12(B)(6): Memorandum of Points and
`Authorities; Implicit v Juniper, Case No. 10-4234.
`Nov. 12, 2010 Juniper Network's Request for Judicial Notice in
`Support of its Motion to Dismiss For Failure to State a Claim Under
`Rule 12(B)(6): Memorandum of Points and Authorities; Implicit v
`Juniper, Case No. 10-4234.
`Dec. 1, 2010 First Amended Complaint; Implicit v Juniper, Case No.
`10-4234.
`Jan. 18, 2011 Juniper Networks, Inc.'s Answer and Affirmative
`Defenses to 1 Amended Complaint, Implicit v Juniper, Case No.
`10-4234.
`Feb. 18, 2011 Plaintiffs Answer to Defendant's Counterclaims,
`Implicit v Juniper, Case No. 10-4234.
`May 23, 2011 Plaintiffs Disclosure of Asserted Claims and Infringe
`ment Contentions, Implicit v Juniper, Case No. 10-4234.
`Nov. 15, 2011 Plaintiffs Amended Disclosure of Asserted Claim and
`Infringement Contentions, Implicit v Juniper, Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief), Implicit v Juniper, Case No.
`10-4234.
`
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit E, Implicit v Juniper,
`Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit J. Implicit v Juniper, Case
`No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibit K. Implicit v Juniper,
`Case No. 10-4234.
`Nov. 28, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Opening Claim Construction Brief Exhibits M-O, Implicit v Juniper,
`Case No. 10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Implicit v Juniper, Case No. 10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit B, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit F. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit N. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit P. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Q. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit S., Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-1, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-2, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-3, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit T-4, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit U, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit V, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit W. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit X. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Y-1. Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, ExhibitY-2, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Y-3, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Y-4, Implicit v Juniper, Case No.
`10-4234.
`Dec. 12, 2011 Holly Hogan Declaration in Support of Defendants'
`Claim Construction Brief, Exhibit Z. Implicit v Juniper, Case No.
`10-4234.
`
`Juniper Ex. 1005-p. 5
`Juniper v Implicit
`
`

`

`US 9,270,790 B2
`Page 6
`
`(56)
`
`References Cited
`
`OTHER PUBLICATIONS
`
`Dec. 19, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Reply Claim Construction Brief, Implicit v Juniper, Case No.
`10-4234.
`Dec. 19, 2011 Spencer Hosie Declaration in Support of Plaintiffs
`Reply Claim Construction Brief, Exhibit P. Implicit v Juniper, Case
`No. 10-4234.
`Jan. 10, 2012 Plaintiffs Jan. 10, 2012 Amended Disclosure of
`Asserted Claims and Infringement Contentions, Implicit v Juniper,
`Case No. 10-4234.
`Feb. 10, 2012 Juniper Networks, Inc.'s Supplemental Invalidity Con
`tentions, Implicit v Juniper, Case No. 10-4234.
`Feb. 10, 2012 Juniper Networks, Inc.'s Sup

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket